Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: Chinese Professor Cracks Fifth Data SecurityAlgorithm (SHA-1)
From: "Dude VanWinkle" <dudevanwinkle () gmail com>
Date: Sat, 24 Mar 2007 10:24:26 -0400

On 3/23/07, Michael Silk <michaelslists () gmail com> wrote:
On 3/23/07, Dave No, not that one Korn <davek_throwaway () hotmail com> wrote:
Tim wrote:
Hello,

On Wed, Mar 21, 2007 at 06:45:19PM +0300, 3APA3A wrote:
Dear Michael Silk,

First,  by  reading  'crack'  I thought lady can recover full
message by it's signature. After careful reading she can bruteforce
collisions 2000 times faster.

Both of you guys are confused.

First off Michael: this is old news.  It doesn't seem to indicate that
finding collisions is any faster than 2^63, which was reported quite
some time ago[1].

  It's not just old news, but old old news, since we already had this
discussion about how it was old news back in january when the piece was
published...


yes yes yes. i have a bad memory. i don't read articles before posting them.
anyone else want to take a shot?

OK.. your parents have a questionable heritage.

there, take that buddy!

-JP

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]